ENGINEERS | ENGINEERING JOBS | ENGINEERING COLLEGES

Friday 26 July 2013

REPORT ON QUANTUM COMPUTER

CLICK HERE TO DOWNLOAD REPORT ON QUANTUM COMPUTER
QUANTUM COMPUTER   Report Transcript
INTRODUCTION- Combining physics, mathematics and computer science, quantum computing has developed in the past two decades from a visionary idea to one of the most fascinating areas of quantum mechanics. The recent excitement in this lively and speculative domain of research was triggered by Peter Shor (1994) who showed how a quantum algorithm could exponentially "speed-up" classical computation and factor large numbers into primes much more rapidly (at least in terms of the number of computational steps involved) than any known classical algorithm. Shor's algorithm was soon followed by several other algorithms that aimed to solve combinatorial and algebraic problems, and in the last few years theoretical study of quantum systems serving as computational devices has achieved tremendous progress.
Common belief has it that the implementation of Shor's algorithm on a large scale quantum computer would have devastating consequences for current cryptography protocols which rely on the premiss that all known classical worst-case algorithms for factoring take time exponential in the length of their input (see, e.g., Preskill 2005). Consequently, experimentalists around the world are engaged in tremendous attempts to tackle the technological difficulties that await the realization of such a large scale quantum computer. But regardless whether these technological problems can be overcome (Unruh 1995, Ekert and Jozsa 1996, Haroche and Raimond 1996), it is noteworthy that no proof exists yet for the general superiority of quantum computers over their classical counterparts. A classical computer has a memory made up of bits, where each bit represents either a one or a zero. A quantum computer maintains a sequence of qubits. A single qubit can represent a one, a zero, or, crucially, any quantum superposition of these; moreover, a pair of qubits can be in any quantum superposition of 4 states, and three qubits in any superposition of 8. The history of computer technology has involved a sequence of changes from one type of physical realisation to another --- from gears to relays to valves to transistors to integrated circuits and so on. Today’s advanced lithographic techniques can create chips with features only a fraction of micron wide. Soon they will yield even smaller parts and inevitably reach a point where logic gates are so small that they are made out of only a handful of atoms. On the atomic scale matter obeys the rules of quantum mechanics, which are quite different from the classical rules that determine the properties of conventional logic gates. So if computers are to become smaller in the future, new, quantum technology must replace or supplement what we have now.
The point is, however, that quantum technology can offer much more than cramming more and more bits to silicon and multiplying the clock--speed of microprocessors. It can support entirely new kind of computation with qualitatively new algorithms based on quantum principles! WHAT IS QUANTUM IN QUANTUM COMPUTER? One of the embarrassments of quantum computing is the fact that, so far, only one algorithm has been discovered, namely Shor's, for which a quantum computer is significantly faster than any known classical one. It is almost certain that one of the reasons for this scarcity of quantum algorithms is related to the lack of our understanding of what makes a quantum computer quantum (see also Preskill 1998 and Shor 2004). As an ultimate answer to this question one would like to have something similar to Bell's (1964) famous theorem, i.e., a succinct crispy statement of the fundamental difference between quantum and classical systems,
encapsulated in the non-commutative character of observables. Quantum computers, unfortunately, do not seem to allow such simple characterization. Observables—in the quantum circuit model there are only two, the preparation of the initial state and the observation of the final state, in the same basis, and of the same variable, at the end of the computation—are not as important here as in Bell's case since any measurement commutes with itself. The non-commutativity in quantum computing lies much deeper, and it is still unclear how to cash it into useful currency. Quantum computing skeptics (Levin 2003) happily capitalize on this puzzle: If no one knows why quantum computers are superior to classical ones, how can we be sure that they are, indeed, superior? The elusive character of the physical resource responsible for the quantum "speed-up" can be nicely demonstrated with the following example. Consider a solution of a decision problem, say satisfiability, with a quantum algorithm based on the circuit model. What we are given here as input is a proposition in the propositional calculus and we have to decide whether it has a satisfying truth assignment. As Pitowsky (2002) shows, the quantum algorithm appears to solve this problem by testing all 2n assignments "at once", yet this quantum ‘miracle’ helps us very little since any measurement performed on the output state collapses it,
and if there is one possible truth assignment that solves this decision problem, the probability of retrieving it is 2-n, just as in the case of a classical probabilistic Turing machine which guesses the solution and then checks it. Pitowsky's conclusion is that in order to enhance computation with quantum mechanics we must construct ‘clever’ superpositions that increase the probability of successfully retrieving the result far more than that of a pure guess. Shor's algorithm and the class of algorithms that evaluate a global property of a function (this class is known as the hidden subgroup class of algorithms) are (so far) a unique example of both a construction of such ‘clever’ superposition and a retrieval of the solution in polynomial time. The quantum adiabatic algorithm may give us similar results, contingent upon the existence of an energy gap that decreases polynomially with the input. WHAT IS QUIBIT? From a physical point of view a bit is a physical system which can be prepared in one of the two different states representing two logical values --- no or yes, false or true, or simply 0 or 1. Quantum bits, called qubits, are implemented using quantum mechanical two state systems; these are not confined to their two basic states but can also exist in superpositions: effectively this means that the qubit is both in state 0 and state 1. The Bloch Sphere QUANTUM GATE- Classical computational gates are Boolean logic gates that perform manipulations of the information stored in the bits. In quantum computing these gates are represented by matrices, and can be visualized as rotations of the quantum state on the Bloch sphere. This visualization represents the fact that quantum gates are unitary operators, i.e., they preserve the norm of the quantum state (if U is a matrix describing a single qubit gate, then U†U=I, where U† is the adjoint of U, obtained by transposing and then complex-conjugating U). As in the case of classical computing, where there exists a universal gate (the combinations of which can be used to compute any computable function), namely, the NAND gate which results from performing an AND gate and then a NOT gate, in quantum computing it was shown (Barenco et al., 1995) that any multiple qubit logic gate may be composed from a quantum CNOT gate (which operates on a multiple qubit by flipping or preserving the target bit given the state of the control bit,
an operation analogous to the classical XOR, i.e., the exclusive OR gate) and single qubit gates. One feature of quantum gates that distinguishes them from classical gates is that they are reversible: the inverse of a unitary matrix is also a unitary matrix, and thus a quantum gate can always be inverted by another quantum gate. The CNOT Gate Unitary gates manipulate the information stored in the quantum register, and in this sense ordinary (unitary) quantum evolution can be regarded as computation (DiVicenzo 1995 showed how a small set of single-qubit gates and a two-qubit gate is universal, in the sense that a circuit combined from this set can approximate to arbitrary accuracy any unitary transformation of n qubits). In order to read the result of this computation, however, the quantum register must be measured.
The measurement gate is a non-unitary gate that "collapses" the quantum superposition in the register onto one of its terms with the corresponding probability. Usually this measurement is done in the computational basis, but since quantum mechanics allows one to express an arbitrary state as a linear combination of basis states, provided that the states are orthonormal (a condition that ensures normalization) one can in principle measure the register in any arbitrary orthonormal basis. This, however, doesn't mean that measurements in different bases are efficiently equivalent. Indeed, one of the difficulties in constructing efficient quantum algorithms stems exactly from the fact that measurement collapses the state, and some measurements are much more complicated than others. How quantum computer compute? Once the register is prepared in a superposition of different numbers one can perform operations on all of them. Quantum computer processor Thus quantum computers can perform many different calculations in parallel: a system with n qubits can perform 2n calculations at once! This has impact on the execution time and memory required in the process of computation and determines the efficiency of algorithms. How Powerful are Quantum Computer? For an algorithm to be efficient, the time it takes to execute the algorithm must increase no faster than a polynomial function of the size of the input. Think about the input size as the total number of bits needed to specify the input to the problem—for example, the number of bits needed to encode the number we want to factorize.
If the best algorithm we know for a particular problem has the execution time (viewed as a function of the size of the input) bounded by a polynomial then we say that the problem belongs to class P. Computational complexity Problems outside class P are known as hard problems. Thus we say, for example, that multiplication is in P whereas factorization is not in P. “Hard? in this case does not mean “impossible to solve? or “non-computable.? It means that the physical resources needed to factor a large number scale up such that for all practical purposes, it can be regarded as intractable. However some of quantum algorithms can turn hard mathematical problems into easy ones --
- factoring being the most striking example so far. The difficulty of factorisation underpins the security of what are currently the most trusted methods of public key encryption, in particular of the RSA (Rivest, Shamir and Adelman) system, which is often used to protect electronic bank accounts. Once a quantum factorisation engine (a special-purpose quantum computer for factorising large numbers) is built, all such cryptographic systems will become insecure. Potential use of quantum factoring for code-breaking purposes has raised the obvious suggestion of building a quantum computer. How to build a Quantum Computer? In principle we know how to build a quantum computer; we start with simple quantum logic gates and connect them up into quantum networks. A quantum logic gate, like a classical gate, is a very simple computing device that performs one elementary quantum operation, usually on two qubits, in a given time. Of course, quantum logic gates differ from their classical counterparts in that they can create and perform operations on quantum superpositions. Quantum networks Realizations The quantum computer might be the theoretician's dream, but as far as experimentalists are concerned, its realization is a nightmare. The problem is that while some prototypes of the simplest elements needed to build a quantum computer have already been implemented in the laboratory, it is still an open question how to combine these elements into scalable systems. Shor's algorithm may break the RSA code, but it will remain an anecdote if the largest number that it can factor is 15. In the circuit-based model the problem is to achieve a scalable quantum system that at the same time will allow one to (1) robustly represent quantum information, (2)
perform a universal family of unitary transformation, (3) prepare a fiducial initial state, and (4) measure the output result. Alternative paradigms may trade some of these requirements with others, but the gist will remain the same, i.e., one would have to achieve control of one's quantum system in such a way that the system will remain "quantum" albeit macroscopic or even mesoscopic in its dimensions. Several ingenious solutions to the first two requirements above were devised, including quantum error correction codes (Shor 1995) and fault tolerant computation (Shor and DiVicenzo 1996, Aharonov and Ben-Or 1997) that dramatically reduce the spread of errors during a ‘noisy’ quantum computation. The problem, however, lies in the last two requirements. If one hopes to solve intractable problems efficiently with a scalable quantum computer, then the preparation of the input state and the measurement of the output state must be performed in such a way that will not increase the complexity of the computation. In other words, if the construction of the theoretical operator that measures a quantum state which encodes a solution to an NP-complete problem requires an exponential time, or even solving yet another NP-complete problem, then one has gained nothing by representing this solution in a quantum state. Why is it difficult to make a Quantum Computer? As the number of quantum gates in a network increases, we quickly run into some serious practical problems. The more interacting qubits are involved, the harder it tends to be to engineer the interaction that would display the quantum properties. The more components there are, the more likely it is that quantum information will spread outside the quantum computer and be lost into the environment, thus spoiling the computation. This process is called decoherence. Thus our task is to engineer sub-microscopic systems in which qubits affect each other but not the environment. APPLICATION- As our technology rushes forward, several factors work together to push us toward the quantum computing world,
and push out the classical silicon-based chips. These factors are: scaling in size, energy consumption, economics of building leading edge computers, and new applications that are available with quantum computers that cannot be executed with classical computers. At the current rate of chip miniaturization, energy efficiency, and economics, the classical computer of the year 2020 (if it could happen at all), would contain a CPU running at 40 GHz (or 40,000 MHz), with 160 Gb (160,000 MB) RAM, and run on 40 watts of power. Scaling -Our computing world is surrounded by breath-taking innovations, and many of them involve more powerful and smaller chips.
Chip capacity has doubled every 18 months, according to Moore’s Law, but the chip size remains constant. The number of transistors on a single chip is rising exponentially also. Keyes extrapolates that if miniaturization continues at the current rate, a bit will be represented by a single atom by the year 2020. This trend inevitably leads us into the micoworld of quantum effects, where classical rules no longer apply. Energy -The speed of chips is also rising exponentially. Faster, more densely-packed, and closer transistors cause thermodynamic problems. Advances in energy efficiency are required to keep the chips from melting during use. Fortunately, energy efficiencies are increasing, and the thermodynamic problems are being resolved. These energy advances are also pushing the physics of chips into the quantum realm. Quantum computers are reversible, therefore there is theoretically no net energy consumption. Quantum reversibility means that quantum computers drive themselves forward in infinitesimal (reversible) steps, much the same way that molecules of perfume would diffuse from a perfume bottle. Quantum computer programs are not "run", but are said to "evolve," as they process the program’s inputs to outputs. Incidentally, reversibility also means that the inputs of a quantum computer can be implied from the outputs; the program can be run backwards to get the inputs.) The argument for energy inevitability is a "carrot-and-stick" argument: the energy inefficiencies drive us away from classical computers, and the appeal for energy-free (or at least, much reduced energy consumption) computing drives us toward quantum computers. Economics -Besides the energy factors at the micro level of computing, there are large-scale economic factors pushing us to a more energy-efficient means of computing: 5% of the entire national power production is consumed by computing machinery.
With "fossil fuels continuing to dwindle, fission power in disfavor with the public, and fusion power still many decades away, the drain computers impose on our power supply could become significant." The cost to build a semiconductor plant doubles every three years. By extrapolating that trend to the year 2020, a semiconductor plant will cost $1 trillion to build, which is 5% of the U.S. GNP. Based on Motorola’s sales figures, a similar company would need $10 trillion in annual sales to support that kind of construction. Japan, in its bid for software and hardware global dominance, has allocated huge funds for quantum computer research. ***, VP of Hewlett-Packard, reported that 70% of all quantum computer research is being done by the Japanese. They have included quantum computers as an integrated step of their global acquisition strategy. FUTURE PROSPECTS- Encryption Technology The speed of quantum computers also jeopardize the encryption schemes that rely on impracticably-long times to decrypt by brute force methods. Encryption schemes that may take millions of years to guess and check are now vulnerable to quantum computers that may reach a solution within one year. Many governments, included ours, use such encryption schemes for national security. They are very interested in any technology that puts that at risk. As a result, the Office of Naval Research, the CIA, and DARPA, are sinking huge funds into quantum computer research. DARPA is funding $5 million for a Quantum Information and Computing Institute, and the CIA is funding an unknown amount for factoring of large integers, a fundamental part of encryption technology. Ultra-secure and Super-dense Communications It is possible to transmit information without a signal path by using a newly-discovered quantum principles, quantum teleportation. There is no way to intercept the path and extract information. Ultra-secure communication is also possible by super-dense information coding, which is a new technology in its own right. Quantum bits can be used to allow more information to be communicated per bit than the same number of classical bits. Improved Error Correction and Error Detection Through similar processes that support ultra-secure and super-dense communications, the existing bit streams can be made more robust and secure by improvements in error correction and detection. Recovering informational from a noisy transmission path will also be a lucrative and useful practice. Molecular Simulations Richard Feynman showed in 1982 that classical computers cannot simulate quantum effects without slowing down exponentially;
a quantum computer can simulate physical processes of quantum effects in real time. Molecular simulations of chemical interactions will allow chemists and pharmacists to learn more about how their products interaction with each other, and with biological processes such as how a drug may interact with a person’s metabolism or disease. Pharmaceutical research offers a big market to such applications. True Randomness Classical computers do not have the ability to generate true random numbers.
The random number generators on today’s computers are pseudo-random generators—there is always a cycle or a trend, however subtle. Pseudo-random generators cannot simulate natural random processes accurately for some applications, and can not reproduce certain random effects. Quantum computers can generate true randomness, thus give more veracity to programs that need true randomness in their processing. Randomness plays a significant part of applications with a heavy reliance on statistical approaches, for simulations, for code making, randomized algorithms for problems solving, and for stock market predictions, to name a few. With the global forces of computer competition, encryption technology for national security, new applications, and the thermodynamics of computer systems changing as they are, there is a rush toward the new quantum technology to produce the first viable quantum computer. The world is moving toward a place that no classical computer has gone before, nor can go.
Share this post
  • Share to Facebook
  • Share to Twitter
  • Share to Google+
  • Share to Stumble Upon
  • Share to Evernote
  • Share to Blogger
  • Share to Email
  • Share to Yahoo Messenger
  • More...

0 comments

:) :-) :)) =)) :( :-( :(( :d :-d @-) :p :o :>) (o) [-( :-? (p) :-s (m) 8-) :-t :-b b-( :-# =p~ :-$ (b) (f) x-) (k) (h) (c) cheer

Labels

.PDF (2) 3D TECHNOLOGY (1) 3G (1) 4G (1) 4G TECHNOLOGY (1) 8085 MICROPROCESSOR (2) A CASE STUDY ON METHOD STUDY (1) ABAP (1) AC SUPPLY SYSTEM (1) ADDRESSING MODE (1) ADITYA CEMENT (1) ADMIXTURES (2) ADO.NET (1) Advance Processor (1) AERODYNAMIC DESIGN (1) AES (1) AGGREGATES (1) AICTE (1) AIR & DRAFT SYSTEM (2) AIR POLLUTION AND ITS LEGISLATIONS (1) Air Traffic Control (1) Airtel Mobile Service (2) AJAX (3) ALCOHOL (1) AMF PANEL (1) ANALOG AND DIGITAL FILTERS (1) ANALOG TO DIGITAL (1) Android (4) ANGLE MODULATION (1) ANIMATION (1) ANTENNA FUNDAMENTALS (1) APPLICATION DEVELOPMENT (1) APPLICATION OF NON CONVENTIONAL AND RENEWABLE ENERGY SOURCES (1) Application Programming Java (1) APPLICATIONS OF ASP.NET (1) Aricent Technologies (1) ARITHMETIC OPERATORS (1) ARM ARCHITECTURE (1) ARM Instruction Sets And Programs (1) ARM Programming (1) ARP And RARP (1) Artificial Intelligence (3) Artificial Neural Networks (1) ASH HANDLING SYSTEM (1) ASP (2) ASP .NET (6) ASP.NET FUNDAMENTALS (1) ASP.NET OVERVIEW (1) ASP.NET WITH C# (1) ASSEMBLY LANGUAGE (1) ASTRA SITE TEST (1) Attendance Management System In ASP.NET (1) AUSTRALIA (1) AUTOCAD (1) AUTOMATED TESTING (1) AUTOMATIC BEVERAGE VENDING MACHINE (1) AUTOMATION (1) AUTOMATION MANUFACTURING (1) Automobile (1) AUTOMOBILE SECTOR OF INDIA (1) Auxiliary Steam System (1) AVR INTRODUCTION (1) AVR Microcontroller Family (1) AVR RISC (1) B-SPLINE (1) B-SPLINE NOTES (1) BAR CODE TECHNOLOGY (1) BARC (1) Barcode Tech. (1) BARCODING FOR BEGINNERS (1) Barriers To Communication (1) BIG DATA (1) BINARY CODES (1) BIOCHIPS (1) BIOFULES (1) BIOLOGICAL DENITRIFICATION (1) Biophotonics (1) BIRLA CEMENT (1) BIRLA CEMENT WORKS (1) BLACK BOX TESTING TECHNIQUES (1) BLACKBERRY DEVELOPMENT (1) BLENDED CEMENTS FOR DURABLE CONCRETE STRUCTURES (1) Blu Ray Disc (1) Blue Eye Technology (1) Bluetooth (1) BOILER (1) BOILER AND AUXILIARIES (1) Boiler Normal Shut Down to Cold (1) BOILERS FUNDAMENTALS (2) Boilers In Indian Industries (1) BOKARO STEEL PLANT (1) BPO (2) BPO/KPO Job (2) BRAIN FINGERPRINTING (1) BROADBAND NETWORK OPERATION SYSTEM (1) Browser RAD Tools (1) BSNL (1) BUGZILLA (1) Bus AMBA (1) C LANGUAGE (2) C# (1) C++ (6) CABLE MODEM (1) CABLES (1) CACHE MEMORY (1) CALIBER MANAGEMENT TOOL (1) CANADA (1) CAPTCHA (1) CARBON CREDITS (1) CARGO TANK ATMOSPHERE (2) Cascading Style Sheets (1) CAT / MAT (1) CCNA (2) CDMA (1) CEERI (2) CELLULOSE (1) CEMENT CONCRETE MIX DESIGN (1) CEMENT PLANTS (1) Chameleon Chips (1) CHAOTIC- MIMO TECHNIQUES (1) CHARGED DEFECTS GETTERING AND CRYSTAL GROWING PROCESSES (1) CHEBYSHEV FILTER (1) CHHABRA THERMAL POWER STATION (1) CHROMATOGRAPHIC (1) CHROMATOGRAPHY (1) CINEMAX (1) CIRCULATING WATER (1) CIVIL AVIATION (1) CIVIL SERVICES (1) CLASSES AND OBJECTS (1) CLIMATE CHANGE FOR BETTER LIVING (2) CLOUD COMPUTING (5) Cluster Analysis (1) Cluster Computing (1) CMOS (1) COAL (1) COAL HANDLING PLANT (1) COAL TRANSPORTATION AND HANDLING (1) COBOL (1) COCA COLA (1) CODA (1) CODE LOCK (1) CODNS REPORT (1) COGNITIVE RADIO (1) COGNITIVE RADIO NETWORKS (1) COGNOS (1) Combinational logic Design (1) COMBUSTION THEORY (2) COMMUNICATION (3) COMMUNICATION SYSTEM (2) COMPUTER (5) COMPUTER CODES (1) COMPUTER DATA (1) COMPUTER FUNDAMENTALS (1) COMPUTER GRAPHICS (1) Computer Hardware (2) COMPUTER MEMORY (1) COMPUTER NETWORK TOPOLOGY (1) Computer Networking (2) COMPUTER NETWORKS (2) COMPUTER NUMBER SYSTEM (1) COMPUTER OPERATING SYSTEM (1) COMPUTER SYSTEMS (1) COMPUTER VIRUSES (2) COMPUTER'S PERIPHERALS (1) COMPUTERS (1) CONDENSER PERFORMANCE (1) CONNECTING DEVICES (1) CONSTITUENTS AND APPLICATIONS IN CONCRETE (1) Control Panels (1) COOLING TOWER (1) COPROMO (1) COQUALMO (1) CORADMO (1) CORE JAVA (1) CORRELATION AND REGRESSION ANALYSIS (1) CORROSION IN METALS (1) COSTAR SOFTWARE (1) CRITICAL PATH METHOD (1) CRM (1) CRUISE CONTROL (1) CRYPTOGRAPHY (2) CRYSTAL STRUCTURE (1) CSS (3) CT UNIT IMPULSE (1) CURIOSITY ROVER (1) CYBER CRIME (2) Cyber Forensic Tools (1) Cyber Terrorism (1) DATA COMMUNICATION (1) DATA FLOW MODEL (1) DATA LINK LAYER (1) DATA MANAGEMENT (1) Data Mining Classification and Prediction (1) Data Mining Concepts and Techniques (1) Data Mining Primitives (1) Data Preprocessing (1) Data Warehouse (1) DATA WAREHOUSING (1) DATABASE AND DATA WARAEHOUSE FUNDAMENTALS (1) Databases And DBMS (1) DATALINK LAYER (1) DB2 (1) DBMS (2) DC Supply System (1) DCCN (1) DCS (1) DEFENCE (1) Delegation Of Powers (1) DELL (1) DHCP (1) DHTML (1) DIFFUSION (1) DIGITAL SIGNATURE (1) Digital Watermarking (1) DIJKSTRA'S ALGORITHM (1) DIRECTIONAL PATTERN ANALYSIS (1) DISCOVERY (1) DISPLAY TECH. (1) Distributed Systems Principles and Paradigms (1) DISTRIBUTION SUBSTATIONS (1) DMAIC (1) DNA (1) DNA COMPUTING (1) DNS (1) DOCUMENT ARCHITECTURE (1) Doordarshan (1) DOS ATTACK (1) DRDO (1) DRUG TRANSPORT MECHANISMS (1) DRUPAL (1) DRY ETCHING (1) DSA (1) DSL (1) DTH (1) DVD TECHNOLOGY (1) DWDM (1) E GAS SEWA (1) E-BIKES (1) E-COMMERCE (2) E-PROCUREMENT SOLUTION IN NHPC (1) EIGRP (1) ELASTICITY (1) ELECTION ALGORITHMS (1) Election Algorithms and Distributed Processing (1) ELECTRIC HEATING (1) ELECTRIC MOTORS (2) ELECTRIC WELDING (1) ELECTRICAL INSTRUMENTS (1) Electrical Protections (1) ELECTRICAL SYSTEM (1) ELECTRICITY GENERATION PROCESS (1) Electromechanical Pulse Energy (1) ELECTRONIC INSTRUMENTATION (1) Electronic Milk Tester (1) ELECTRONIC TOLL COLLECTION SYSTEM (1) Electronics For Animals (1) eLitmus (1) EMAIL SYSTEMS (1) Embedded Linux (2) EMBEDDED SYSTEM (2) EMERGENCY SUPPLY SYSTEM (1) ENERGY CONSERVATION (1) ENERGY EFFICIENCY (1) ENERGY METERS (1) ENGINEERED PROTEIN (1) ENGINEERING CAREER (1) ENGINEERING PROCESSES (1) ENGINEERING REPORTS (1) ENVIRONMENT IMPACT ASSESSMENT (1) Environment Laws For Power Sector (1) ENVIRONMENTAL CONDITIONS (2) Environmental Protection Act-1986 (1) EQUATIONS (1) ERGONOMIC ANALYSIS (1) ERGONOMIC ASPECTS OF NOISE (1) ERGONOMICS (1) ERP (1) ESCORTS (1) ESP (1) ESSAR (1) ETHANOL (1) ETHICAL HACKING (1) EVEN AND ODD SIGNALS (1) EWSD (1) EXCITATION SYSTEM (2) EXTRANET (1) FACE RECOGNITION (2) FACE RECOGNITION TECHNIQUES (2) FAQs DURING AN INTERVIEW (1) FIBER OPTICS (1) Fighter Planes (1) FILE SYSTEM IN OPERATING SYSTEM (1) Fire Fighting Systems In Power Stations (1) FIREWALL (1) Flame Scanners (1) FLUE GAS SYSTEM AIR PRE HEATER (2) FLUIDIZED BED COMBUSTION SYSTEM (2) FLY ASH CONCRETE MIX DESIGN (1) Foster Wheeler Boiler (1) FOUR LEVELS OF INFORMATION SYSTEM (1) FOUR SPECIAL CASES IN SIMPLEX (1) FOURIER SERIES (1) Framework (1) FREE SPACE OPTICS (1) FREQUENCY HOPPING (2) FUEL (1) FUEL OIL SYSTEM (5) FUEL OIL SYSTEM PURPOSE (1) FULL WAVE RECTIFIER (1) FUNDAMENTALS OF MANUFACTURING SYSTEMS (1) FURNACE SAFEGUARD SUPERVISORY SYSTEM (2) FUTURE CAR (1) GAME THEORY (1) GATE (1) GENERATION OF ELECTRICITY (1) GENERATOR PROTECTION (1) GENETIC ALGORITHMS (1) Genetic Engineering (1) GENOMIC IMPRINTING (1) Genomic Library (1) Geophysical Instrumentation (1) GET AND POST METHODS (1) Gi-Fi (2) GLOBAL MANUFACTURING SYSTEM (1) GLOBAL SYSTEM FOR MOBILE COMMUNICATION (1) GMAT (1) GMPLS CONTROL PLANE (1) GOOGLE (1) GOOGLE NEXUS (1) Governing System (1) GOVERNMENT GRANTS (1) Govt. Job (3) GPRS (1) GPS (1) GRAFFITI (1) Graphics Editor (1) GRAVIMETRIC ANALYSIS (1) GRE (1) Green Computation (1) GREEN HOUSE EFFECT (1) GREEN REVOLUTION (1) GREY BOX TESTING (1) GRID COMPUTING (1) GSM (3) GSM ADVANCE TRAINING (1) GSM AIR INTERFACE (1) GSM BSS (1) GSM NETWORK ARCHITECTURE (1) GSM NETWORK INTERFACES (1) GSM RADIO TRANSMISSION (1) GSM TRAFFIC CASES (1) GSM TRAINING (1) GSS (1) HACKING (1) Hadoop (2) Handling And Disposal Of Oily Bilge Water (1) Haptics (1) HARLEY DAVIDSON (1) HEAPSORT (1) HINDUSTAN COPPER LIMITED (1) HINDUSTAN ZINC LIMITED (1) HMT (1) HOLOGRAPHY (1) Host Mobility (1) HOSTING (1) HOW DSL WORKS (1) HP BYPASS (1) HTML (5) HTTP (1) HUMAN ROBOT (1) HUMANOIDS (1) HUTCHISON TELECOM (2) HYDRO SECTOR (1) HYDROGEN ENERGY (1) HYPERTENSION (1) HYPNOSIS (1) HYUNDAI MOTORS (1) I MODE (1) IBM (1) IBM AS/400 (1) IBM INDIA (1) IC ENGINES (1) IC TECHNOLOGY (1) ILLUMINATION ENGINEERING (1) ILLUSTRATOR (1) IMAGE ENCRYPTION ALGORITHM (1) IMAGE FILE FORMATS (1) IMAGE FUSION (1) IMMUNO TECHNOLOGY (1) IMPACT OF ATMOSPHERICS ON QUALITY INFERENCES (1) IMPULSE TURBINE (1) INDUCTANCE (1) Induction Furnace (1) INDUCTION GENERATOR (1) INDUCTION MACHINE (1) Induction Motor (1) INDUCTION MOTOR MODEL (1) INDUCTION MOTOR STARTING (1) Industrial Automation (1) Industrial Design In India (1) Industrial Safety And Accident Prevention (1) Inert Gas System (1) INFORMATION SECURITY (1) INFORMATION SYSTEM FOR MANUFACTURING (1) INFOSYS (1) INFOSYS DRIVEN BY VALUES (1) INQUIRY (1) INSERTION SORTING (1) INSPECTION AND GOOD CONSTRUCTION PRACTICES (1) Integrated Management System (1) INTEGRATED MAUFACTURING SYSTEM (1) Inter Integrated Circuit (1) Internal Combustion Engines (2) Internet (4) Internet Protocol (1) INTERNETWORKING DEVICES (1) INTERRUPT MECHANISM (1) INTERVIEW SKILLS (1) INTRA ASN IEEE802.16e (1) INTRANET (1) INTRODUCTION OF GSM (1) INTRODUCTION OF THERMAL POWER PLANT (1) INTRODUCTION TO C SHARP (3) INVISIBLE BAR CODES (1) IOCL (1) ION EXCHANGE CHROMATOGRAPHY (1) ION IMPLANTATION (1) ION IMPLANTATION PROCESS (1) ION TRACK BASED TUNABLE DEVICES (1) iOS 6 (1) IP Addresses (2) iPHONE (1) iPHONE 5 (1) IS-LM MODEL (1) ISEH FRP V7.0 (1) ISM CODES (1) ISO 9001:2008 (1) ISPS (1) ISRO (1) IT And Communication Infrastructure (1) ITES (1) J2EE (1) JAVA (9) JAVA APPLICATIONS (1) JAVA BEANS (1) JAVA DATABASE CONNECTIVITY (1) JAVASCRIPT (3) JAVASCRIPT DIALOG BOXES (1) JIRO Technology (1) JK Cement (1) JK TYRE (1) Job Fair (3) JOOMLA (1) JSP (1) KRUSKAL'S ALGORITHM (1) L.T CIRCUIT BREAKERS (1) La-Mont boiler (1) LAN (1) Landmine Detection (1) LAPLACE CIRCUIT (1) Laser Security (1) LEACH (1) LIFEBUOY (1) LIGHT MICROSCOPY (1) LINEAR EQUATIONS (1) LINUX (3) Linux Booting Procedure (1) Linux Servers (1) LINUX SYSTEM (2) LITHOGRAPHY (1) LOAD SHARING (1) LOGIC CONTROLLER (1) LOGICS (1) LOGO DESIGN (1) LOW DROPOUT REGULATOR (1) LUBRICATION (1) MACHINING (1) Maglev Trains (1) MAGNETIC FORCES MATERIALS (1) MAHINDRA (1) MAINFRAME (1) MAMMOGRAMS (1) Manage IS Development (1) MANAGEMENT IN MANUFACTURING SYSTEM (1) MANUFACTURING PRESENTATION (1) MANUFACTURING EXCELLENCE (1) MARK I (1) MARK I FPA (1) MARK II FPA (1) MARPOL (1) MARS ROVER (1) MARUTI 800 (1) MASS CONCRETE MIX (1) MATLAB (3) MCA (1) MCITP (1) MEDIUM ACCESS CONTROL SUBLAYER (1) MEMS SWITCH (1) MEMS TECHNOLOGY (1) Meta Search Engines (1) METALLURGICAL TESTING (1) MICRO CANTILEVER ENERGY HARVESTER (1) MICROBIAL GROWTH (1) MICROCALCIFICATIONS (1) MICROCONTROLLER BASED ALARM SYSTEM (1) MICROCONTROLLERS (1) MICROPROCESSOR (2) Microscopic Techniques (1) MICROSOFT (MS) ACCESS (1) MICROSOFT (MS) SQL (1) MICROSOFT EXCEL (1) MICROSOFT OFFICE EXCEL 2003 (1) MICROSOFT OFFICE OVERVIEW (2) MICROSOFT OFFICE WORD 2003 (1) MICROSOFT PROJECT (1) MICROSOFT WORD (1) Microstrip Patch Antenna (1) MICROVIA TECH. (1) MICROWAVE ABSORPTION PROPERTIES OF GRAPHITE FLAKES (1) MICROWAVE COMMUNICATION (1) MICROWAVE LINK DESIGN (1) Microwave Technique (1) Milk Fat Testing (1) MINERALS (1) MIS (1) MOBILE COMPUTING (1) Mobile Number Portability (1) MOBILE SECURITY (1) MOBILE TESTING (1) MODELING AND SIMULATION FOR MANUFACTURING SYSTEM (1) MODELLING TOOLS IN MANUFACTURING (1) MODEMS (2) MODIFIED FUEL LEVEL INDICATOR (1) MODIFIER (1) MOG ANDROID (1) MOSFET (1) MOTION ECONOMY (1) MOTIVATION THEORY (1) Mozilla Firefox (1) MPEG4 (1) MPHASIS (1) MRAM (1) MRT (1) Multi Core Technology (1) MULTICAST ROUTING (1) MULTIMEDIA NETWORKING SYSTEM (1) MULTIMEDIA PROJECTS (1) MULTIMEDIA SKILLS (1) MULTIMEDIA TECHNOLOGIES (1) Multimedia Technology (1) MULTIPLE INTELLIGENCES (1) MULTISENSOR DATA FUSION (1) MYSQL (2) NANOBOTS (1) NANOTECHNOLOGY (2) NASA (1) NASCAR (1) Need Of ERP (1) NETWORK BASICS (1) NETWORK LAYER (2) NETWORK PROTOCOLS (1) Network Security (2) NETWORK SWITCH (1) NETWORKING (5) New Idea Put To Road Test (1) NEWZELAND (1) NHPC (1) NIS And Setting Up Router (1) Nokia Morph Concept (1) NOKIA SIEMENS NETWORKS (1) NON CONVENTIONAL ENERGY SOURCES (1) NONVERBAL COMMUNICATION (1) NTPC (2) NUCLEAR ENERGY (1) NUCLEAR POLLUTION (1) NUMBER SYSTEMS (1) OBJECT ORIENTED (1) OCCUPTIONAL VIBRATION (1) OFDM (1) OIL AND GAS INDUSTRY (1) OLYMPIC PRODUCTS (1) OMEGA ELECTRONICS (1) ONGC (1) ONLINE EDUCATION SERVICES (1) ONLINE MOBILE RECHARGE (1) ONLINE SHOPPING SITE (1) OOPS (1) OPERATING SYSTEM (3) OPERATING SYSTEM SECURITY (1) OPERATIONS DEPARTMENT PROCEDURE (1) Optical Computing (1) OPTICAL LOGIC GATES (1) OPTICAL NETWORK (1) OPTIMIZED ANN (1) ORACLE (4) ORACLE 10G (2) ORACLE 9I (1) Oracle Database (1) ORACLE HUMAN RESOURCES (1) ORGANIZATIONAL STRUCTURE AND DESIGN (1) OSI MODEL (1) OXIDATION (1) OXIDATION TECHNIQUES AND SYSTEMS (1) PACKET LOSS CONCEALMENT USING AUDIO MORPHING (1) Packet Tracer 5.0 (1) PAPER CLIP (1) PARKING MANAGEMENT SYSTEM (1) PARTS OF DESKTOP (1) PATTERN PRINTERS (1) PATTERN TRANSFER (1) PCB (1) PCB ANALYSIS (1) PEDAL POWER HACKSAW (1) Pedal Power Zeolite Refrigeration (1) PEER TO PEER NETWORKS (1) Penetration Testing (1) Performance Management Process (1) PERL (1) PHISHING (1) PHOTOSHOP (1) PHOTOVOLTAIC SYSTEM (1) PHP (4) PHP AND SQL (1) PHP ERROR (1) PHP FILE INCLUSION (1) PHP FILE UPLOADING (1) PHP FILES (1) PHP FUNCTIONS (1) PHP OPERATORS (1) PHP SESSIONS (1) PHP TECHNOLOGY (1) PHYSICAL LAYER (2) Placement Papers (1) PLANT LAYOUT AND CAPACITY PLANNING (1) PLC (2) PLCC (1) Polaris (1) POST TRANSLATIONAL MODIFICATION (1) POWER DISTRIBUTION EQUIPMENT (1) POWER DISTRIBUTION SYSTEM (1) POWER GENERATION IN NTPC (1) POWER GENERATION THROUGH SPEED BREAKERS (1) POWER HOUSE (1) POWER PLANT (2) POWER PLANT EMERGENECIES (1) POWER PLANT OPERATION GENERATOR & AUXILIARIES (1) POWER QUALITY PARAMETERS (1) POWER SCENARIO IN INDIA (1) Prepaid Energy meter (1) PRESENTATION SOFTWARE (1) PREWRITING TECHNIQUES (1) PRINCIPLES OF CONCRETE MIX DESIGN (1) Private Job (1) Procedure For burning Oil (1) PROCESS (1) PROCESS DESCRIPTION (1) PROCESS DESIGN (1) Product Life Cycles And The Boston Matrix (1) PRODUCT STRATEGY (1) PROJECT QUALITY MANAGEMENT (1) Protection System Of Generating Stations (1) PTW SYSTEM (1) PULSE WIDTH MODULATION (1) PUMP (1) PURGING LOGIC (1) QR CODES (1) QUALITY REQUIREMENTS OF CONCRETE - MAKING MATERIALS (1) QUANTUM COMPUTER (2) QUANTUM COMPUTERS (1) QUANTUM COMPUTING (1) Quorum Sensing (1) RADAR (1) RADAR COMMUNICATIONS (1) RADIO CONTROLLED AIRCRAFT (1) RAILWAY (1) RAM (1) RECORDING TECHNIQUES (1) Red Tacton (1) REGENERATIVE SUSPENSION SYSTEM (1) RELAY (1) Remote Control (1) Remote Method Invocation (1) Remote Sensing (1) REMOTE SUSTAINABLE VILLAGES (1) Renewable Energy (4) REQUIREMENT ENGINEERING (1) REQUISITE PRO (1) RESTFUL WEBSERVICES (1) REVEAL.JS (1) RFID (3) Robotics (2) ROCK SLOPE ENGINEERING (1) Role Of Hydrogen In Generator (1) ROM (1) ROUTINE CHECKS BOILER (1) Routine Checks Generator (1) Routine Checks Turbine (1) RSRTC (1) RTLinux (1) RTOS (1) RUBY ON RAILS (1) SAAS AND CLOUD COMPUTING (1) SAMPLE RESUME FOR EXPERIENCED - DOWNLOAD FREE .DOC (1) SAMPLE RESUME FOR FRESHERS - DOWNLOAD FREE .DOC (1) SAMSUNG 3D LED TV (1) SAMSUNG S3 (1) SAP (2) SAP LAP ANALYSIS (1) Satellite Communication (1) SCADA (2) SCADA FUNDAMENTALS (1) SCANNING AND FOOTPRINTING (1) SCHEDULING OF OPERATIONS (1) Secretariat LAN (1) SELF AUTOMATED SAFETY SYSTEM OF TRAIN (1) SELF EMPLOYEMENT In ASP.Net (1) Semantic Web (1) SEMI AUTONOMOUS BIKE (1) SENSORY EVALUATION (1) SENSORY TESTING (2) SEO (1) SEQUENTIAL CIRCUIT (1) Serial Peripheral Interface (1) Servlets (1) Shell Programming (1) SHIFT REGISTERS AND COUNTERS (1) Ship Maneuverability (1) SIGNALS (1) SIGNALS AND SYSTEMS (1) SINGAPORE (1) SIX STROKE ENGINE (1) Sixth Sense Technology (1) SLIDING PRESSURE OPERATION (1) SLIM System (1) Smart Cards (1) SOCIAL ENGINEERING TOOLKIT (1) SOCIAL NETWORKING (1) SOCIAL NETWORKS (1) SOCIAL PROBLEMS (1) SOFT SYSTEM METHODOLOGY (1) SOFTWARE (1) SOFTWARE DESIGN (1) SOFTWARE DEVELOPMENT (1) SOFTWARE ENGINEERING (2) SOFTWARE FOR IMPLEMENTATION OF ATM (1) Software Management Topics (1) SOFTWARE METRICS (1) Software Requirements Specification (1) SOFTWARE RESEARCH EXPRESS (1) Software Testing (2) SOLAR CELL (2) SOLAR PANEL ROAD (2) SOLAR PV (1) SONY ERICSSON (1) SOURCE AND SINK ANALYSIS (1) SPEAKER RECOGNITION (1) SPECTROSCOPY (1) SPEECH RECOGNITION (2) Splines and Bezier Curves (1) SPREAD SHEET (1) Spring Framework (1) SQL (2) SQL INJECTION (1) State Management Techniques (1) Stealth Technology (1) STEAM CIRCULATION SYSTEM (1) Steam Raising (1) STEAM TURBINE (1) STEAM TURBINES FOR SUPERCRITICAL POWER PLANTS (1) STEEL INDUSTRY (1) Steel Plant (1) STEVE JOBS (1) STIRLING ENGINE (1) STORAGE DEVICES (1) STORAGE OVERVIEW AND ARCHITECTURE (1) STRESS (1) STUDY ABROAD (6) SUBNETTING (1) SULZER RT FLEX MARINE DIESEL ENGINE (1) SUMS AND PRODUCTS OF SIGNALS (1) Sun Solaris Os (1) SURATGARH THERMAL PLANT (1) Surface Detection Methods (1) SURFACE MOUNT TECHNOLOGY (2) SUSTAINABLE DEVELOPMENT (1) Swarm Intelligence (1) SWITCHING AND NETWORKS (1) SWITCHING AND ROUTING (1) SWITCHYARD (1) SYMBIAN OS (1) SYSTEM PROGRAMMING (1) TABU SEARCH (1) TABULATION METHOD (1) TATA INDICOM (1) TATA MAGIC (1) TATA MOTERS (1) TATA MOTORS (2) TATA NANO (2) TATA STEEL (1) TATA Tele Services (1) Technical Analysis (1) TELECOM SOFTWARE (1) TELECOMMUNICATION INDUSTRY IN INDIA (1) Teleconferencing (1) TEST CENTER (1) TEST POINT ANALYSIS (1) TESTING (1) Testing And Calibration (1) TESTING LEVELS (1) TEXT (1) The Locus Distributed Operating System (1) THERMAL CUTTING PROCESS (1) THERMAL POWER PLANT (1) THERMAL POWER PLANTS (1) THERMAL POWER STATIONS (1) THERMOGRAPHY (1) THIN FILM TECHNOLOGY (2) THREE PHASE CIRCUITS (1) Tiled Microprocessor (1) TOEFL / IELTS (1) Tools of Internet (1) TOUCH SCREEN TECHNOLOGY (2) TOUCHSCREEN (1) TRADITIONAL DATABASE APPLICATIONS (1) TRAINING AND DEVELOPMENT (1) TRANSACTION PROCESSING (1) TRANSCRIPTION (1) TRANSDUCER MATERIALS (1) TRANSFORMERS (2) TRANSISTOR AGING (1) TRANSMISSION LINE (1) TRANSMISSION MEDIA (1) TRANSMISSION SYSTEM (1) TRANSMISSION SYSTEM AND ITS CONFIGURATION (1) TRANSPORT AND APPLICATION LAYER (1) TURBINE (1) TURBINE CONDENSATE SYSTEM (2) TURBINE FLEET IN NTPC (1) Turbo Generators (1) TWO STROKE FUEL ENGINE (1) TWO-WHEELER INDUSTRY IN INDIA (1) Ubiquitous Computing (1) UK (1) Underground Communication (1) UNIT SHUT DOWN PROCEDURE (1) UNIX (2) UNIX SPECIAL VARIABLES (1) UPS (1) UREA PLANT (1) USA (1) USE OF CHEMICAL AND MINERAL ADMIXTURES IN CONCRETE (1) UWB ECHO SIGNAL (1) VAPOR ABSORPTION REFRIGERATION (1) VARIABLE SPEED DRIVES (1) VERILOG (1) VHDL (1) VHDL AND DIGITAL CIRCUIT DESIGN (1) VIBRATION (1) VIDEO DISPLAY DEVICES (1) VIDEOCON (1) VIKRAM CEMENT (1) VIRTUAL KEYBOARD (1) VIRTUAL ONLINE TUTORING (1) VIRTUAL PROJECTION (1) VIRTUALIZATION (2) Viruses (1) VISIBLE SURFACE DETECTION (1) VISUAL BASIC (3) Visual Studio 2010 (1) VITAL LINK (1) VLAN (1) VLSI (1) VLSI DESIGN (1) VOIP (1) VPN (1) VSB MODULATION (1) VTP (1) Vulnerability Assessment (1) WAFER PREPARATION (1) War Weapons (1) WATER (1) Water pollution And Its Legislation (1) WAVEGUIDE GRATINGS BASED FILTERS (1) WEAPONS DESIGN AND CONTROL SYSTEMS (1) WEATHER RESOURCE SYSTEM (1) WEB DESIGNING (1) WEB ENGINEERING (1) Web OS (1) WEB SECURITY (1) WEB SERVER (1) WEB WAREHOUSING (1) WEBSITE DESIGN AND DEVELOPMENT (1) WELDING (1) WELSPUN CROP LTD (1) WET ETCHING (1) WHAT IS CEMENT (1) WHIRLPOOL (1) WHITE BOX TESTING TECHNIQUES (1) WHOLE NUMBER (1) WI-FI (1) WIBREE (1) WIMAX (2) WIMAX SECURITY (1) WIND ENERGY SYSTEM (1) WIND FARM (1) WINDOWS SERVER (1) Wireless Communication (1) WIRELESS LAN (1) Wireless Mesh Networks (1) WIRELESS SENSOR NETWORKS (2) WIRELESS TECHNOLOGY (1) WLAN CONFIGURATION (1) WORDPRESS (1) Work Environment (1) Workshop For Turbine (1) WORLD WIDE WEB (2) WSN'S (1) XML (2) XTie-RT (1) YAHOO! (1) Yield Curve (1) Z-TRANSFORM (1) ZIGBEE (2) ZINC OXIDE (1)
 
© 2011 ENGINEERS ON WAY
Designed by Ishant Gupta
Posts RSSComments RSS
Back to top